NA

CVE-2022-41049

Published: 09/11/2022 Updated: 08/08/2023
CVSS v3 Base Score: 5.4 | Impact Score: 2.5 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Windows Mark of the Web Security Feature Bypass Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008 r2

microsoft windows server 2012 r2

microsoft windows 10 1607

microsoft windows 8.1 -

microsoft windows server 2016 -

microsoft windows server 2008 -

microsoft windows server 2012 -

microsoft windows 10 -

microsoft windows server 2019 -

microsoft windows 10 1809

microsoft windows 7 sp1

microsoft windows 10 20h2

microsoft windows 10 21h1

microsoft windows server 2022 -

microsoft windows 11 -

microsoft windows 10 21h2

microsoft windows 11 22h2

microsoft windows 10 22h2

Github Repositories

Comparison of MOTW (Mark of the Web) propagation support of archiver software for Windows English | Japanese Background On 3 March 2022, Microsoft announced that the default behavior of Office applications on Windows will be changed to block macros in files from the internet (such as email attachment) An excerpt from the announcement: VBA macros are a common way for malicious

POC of Microcorp vuln

CVE-2022-41049-POC 这是一个测试回购协议,用于查看哪些自动抓取工具/API 将在此回购协议上收集数据,尽管它是完全没有意义的信息